Vladyslav DiadenkoThe Value of Attack EmulationDiscover the value of attack emulation in cybersecurity.3d ago3d ago
Vladyslav DiadenkoOptimizing Windows Security Audit SettingsLearn how to enhance cybersecurity with native Windows logging.Oct 12Oct 12
Vladyslav DiadenkoDeploying Elastic Stack with FortiDragon’s Custom Logstash Pipelines on a Single Node Using AnsibleDeploy Elastic Stack on a single node using Ansible with custom Logstash configurations by FortiDragon for enhanced data processing.Sep 29Sep 29
Vladyslav DiadenkoSetup Elasticsearch Cluster with Custom FortiGate Log CollectorLearn how to set up an Elasticsearch cluster with secure communication, Metricbeat, Filebeat, Fleet Server, and centralized log collection.Sep 15Sep 15
Vladyslav DiadenkoElastic Stack with Docker ComposeA journey from network engineering to cybersecurity, exploring how to build and secure an Elastic Stack using Docker Compose.Sep 1Sep 1